Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Anh Tu Hoang"'
Publikováno v:
BMC Global and Public Health, Vol 2, Iss 1, Pp 1-3 (2024)
Externí odkaz:
https://doaj.org/article/69365d1423f44608939da19f40f0144e
Publikováno v:
Urban Science, Vol 3, Iss 1, p 37 (2019)
In Ho Chi Minh City (HCMC, Vietnam), there is now an urgent need for evaluating access to parks in an effort to ensure better planning within the context of rapid and increasingly privatized urbanization. In this article, we analyze the provision and
Externí odkaz:
https://doaj.org/article/b313b2b03c9645beac7fcd2839c90f9e
Publikováno v:
ACM Transactions on Privacy & Security; May2023, Vol. 26 Issue 2, p1-36, 36p
Publikováno v:
Intelligent Systems and Networks ISBN: 9789811933936
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee0fbab935055d5013ac384170babb75
https://doi.org/10.1007/978-981-19-3394-3_31
https://doi.org/10.1007/978-981-19-3394-3_31
Autor:
Anh Tu Hoang1 anhtu.hoang@ucs.inrs.ca, Apparicio, Philippe1 philippe.apparicio@ucs.inrs.ca, Thi-Thanh-Hien Pham2 pham.thi_thanh_hien@uqam.ca
Publikováno v:
Revue Internationale de Géomatique. 2019, Vol. 29 Issue 2, p135-158. 24p.
Publikováno v:
2021 IEEE 37th International Conference on Data Engineering (ICDE)
ICDE
ICDE
Knowledge graphs (KGs) are widely shared because they can model both users' attributes as well as their relationships. Unfortunately, adversaries can re-identify their victims in these KGs by using a rich background knowledge about not only the victi
While knowledge graphs (KGs) are getting popular as they can formalize many types of users’ data in social networks, sharing these data may reveal users’ identities. Although many protection models have been presented to protect users in anonymiz
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::c95abcc240443eb3df82e17b286cf9c6
https://zenodo.org/record/4017352
https://zenodo.org/record/4017352
Publikováno v:
Applied Cryptography and Network Security
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Applied Cryptography and Network Security
Applied Cryptography and Network Security ISBN: 9783030578770
ACNS (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Applied Cryptography and Network Security
Applied Cryptography and Network Security ISBN: 9783030578770
ACNS (2)
While knowledge graphs (KGs) are getting popular as they can formalize many types of users’ data in social networks, sharing these data may reveal users’ identities. Although many protection models have been presented to protect users in anonymiz
Publikováno v:
2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)
CIC
CIC
Social network providers anonymize graphs storing users' relationships to protect users from being re-identified. Despite the fact that most of the relationships are directed (e.g., follows), few works (e.g., the Paired-degree [1] and K-In&Out-Degree